Journal: Int. J. Found. Comput. Sci.

Volume 28, Issue 8

945 -- 976Mohamed Faouzi Atig, Benedikt Bollig, Peter Habermehl. Emptiness of Ordered Multi-Pushdown Automata is 2ETIME-Complete
977 -- 992Wenyi Hong, Zhenbo Wang. Improved Approximation Algorithm for the Combination of Parallel Machine Scheduling and Vertex Cover
993 -- 1006Yinkui Li, Mingzhe Du, Hongyan Li, Xiaolin Wang. Edge Rupture Degree of Graphs
1007 -- 1020Sepinoud Azimi, Charmi Panchal, Andrzej Mizera, Ion Petre. Multi-Stability, Limit Cycles, and Period-Doubling Bifurcation with Reaction Systems
1021 -- 1046Joel Antonio Trejo-Sánchez, José Alberto Fernández-Zepeda, Julio Cesar Ramírez Pacheco. A Self-Stabilizing Algorithm for a Maximal 2-Packing in a Cactus Graph Under Any Scheduler
1047 -- 0Pingshan Li, Min Xu. The Super Spanning Connectivity of Arrangement Graphs

Volume 28, Issue 7

819 -- 834Lei Sun, Fang-Wei Fu, Jian Liu. On the Conjecture About the Linear Structures of Rotation Symmetric Boolean Functions
835 -- 842Aysun Aytaç, Zeynep Nihan Berberler. Robustness of Regular Caterpillars
843 -- 868Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu. Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security
869 -- 888Gokarna Sharma, Costas Busch. The Bursty Steiner Tree Problem
889 -- 914Jie Lin, Yue Jiang, E. James Harner, Bing-Hua Jiang, Don Adjeroh. IDPM: An Improved Degenerate Pattern Matching Algorithm for Biological Sequences
915 -- 930Lili Guo, Xi Wang, Cheng-Kuan Lin, Jingya Zhou, Jianxi Fan. A Fault-Free Unicast Algorithm in the Generalized Hypercube with Restricted Faulty Vertices
931 -- 944Vaishali M. Wadhwa, Deepak Garg. Approximation Algorithm for Resource Allocation Problems with Time Dependent Penalties

Volume 28, Issue 6

641 -- 644Jinguang Han, Yogachandran Rahulamathavan, Willy Susilo. Preface
645 -- 660Chunguang Ma, Juyan Li, Weiping Ouyang. Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment
661 -- 682Rashed Mazumder, Atsuko Miyaji, Chunhua Su. Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data
683 -- 704Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu. Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud
705 -- 724Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Guang Zeng, Wenbao Han. Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud
725 -- 742Yangguang Tian, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang, Yong Yu. One-Round Attribute-Based Key Exchange in the Multi-Party Setting
743 -- 760Fucai Zhou, Su Peng, Jian Xu 0004, Zifeng Xu. Identity-Based Batch Provable Data Possession with Detailed Analyses
761 -- 780Jianye Huang, Qiong Huang, Chunhua Pan. A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting
781 -- 798Chin-Ling Chen, Jungpil Shin, Yu-Ting Tsai, Aniello Castiglione, Francesco Palmieri. Securing Information Exchange in VANETs by Using Pairing-Based Cryptography
799 -- 818Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Qianhong Wu. Confidentiality-Preserving Publicly Verifiable Computation

Volume 28, Issue 5

437 -- 440Yo-Sub Han, Kai Salomaa. Preface
441 -- 444Zoltán Fülöp 0001. In Memoriam Zoltán Ésik (1951-2016)
445 -- 464Christos A. Kapoutsis, Lamana Mulaffer. A Logical Characterization of Small 2NFAs
465 -- 482Shinnosuke Seki, Andrew Winslow. The Complexity of Fixed-Height Patterned Tile Self-Assembly
483 -- 502Aleksandrs Belovs, J. Andres Montoya, Abuzer Yakaryilmaz. On a Conjecture by Christian Choffrut
503 -- 522Holger Bock Axelsen, Markus Holzer 0001, Martin Kutrib. The Degree of Irreversibility in Deterministic Finite Automata
523 -- 542Markus Teichmann. Regular Approximation of Weighted Linear Context-Free Tree Languages
543 -- 562Martin Sulzmann, Kenny Zhuo Ming Lu. Derivative-Based Diagnosis of Regular Expression Ambiguity
563 -- 582Akio Fujiyoshi. A Practical Algorithm for the Uniform Membership Problem of Labeled Multidigraphs of Tree-Width 2 for Spanning Tree Automata
583 -- 602Suna Bensch, Johanna Björklund, Martin Kutrib. Deterministic Stack Transducers
603 -- 622Jorge Calvo-Zaragoza, José Oncina, Colin de la Higuera. Computing the Expected Edit Distance from a String to a Probabilistic Finite-State Automaton
623 -- 0Daniel Prusa. Complexity of Matching Sets of Two-Dimensional Patterns by Two-Dimensional On-Line Tessellation Automaton

Volume 28, Issue 4

309 -- 320Zahra Moslehi, Alireza Bagheri. Separating Bichromatic Point Sets by Minimal Triangles with a Fixed Angle
321 -- 334Benjamin Russell, Susan Stepney. The Geometry of Speed Limiting Resources in Physical Models of Computation
335 -- 356Goksen Bacak-Turan, Ekrem Oz. Neighbor Rupture Degree of Transformation Graphs Gxy-
357 -- 378Zhiqiang Sun, Lei Hu. Several Classes of Boolean Functions with Four-Valued Walsh Spectra
379 -- 390Dima Grigoriev, Laszlo B. Kish, Vladimir Shpilrain. Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions
391 -- 410Pinhui Ke, Zhifan Ye, Zhengchun Zhou, Jian Shen. Autocorrelation of the Modified Binary Two-Prime Sidelnikov Sequence
411 -- 0Rachid Hadid, Mehmet Hakan Karaata, Vincent Villain. A Stabilizing Algorithm for Finding Two Node-Disjoint Paths in Arbitrary Networks

Volume 28, Issue 3

195 -- 210Alexandros Palioudakis, Kai Salomaa, Selim G. Akl. Worst Case Branching and Other Measures of Nondeterminism
211 -- 228Jing Li, Yuxing Yang, Xiaohui Gao. Hamiltonicity of the Torus Network Under the Conditional Fault Model
229 -- 246Markus Holzer 0001, Sebastian Jakobi. More on Minimizing Finite Automata with Errors - Nondeterministic Machines
247 -- 262Wen Chean Teh, Adrian Atanasiu. Minimal Reaction Systems Revisited and Reaction System Rank
263 -- 288Jean Mairesse, Irène Marcovici. Uniform Sampling of Subshifts of Finite Type on Grids and Trees
289 -- 0Meng Zhang. Fast Convolutions of Packed Strings and Pattern Matching with Wildcards

Volume 28, Issue 2

99 -- 110Xiang Wang, Fang-Wei Fu. Deterministic Construction of Compressed Sensing Matrices from Codes
111 -- 134Quentin Bramas, Sébastien Tixeuil. The Random Bit Complexity of Mobile Robots Scattering
135 -- 140Michael Coons. Regular Sequences and the Joint Spectral Radius
141 -- 170George Lagogiannis. Query-Optimal Partially Persistent B-Trees with Constant Worst-Case Update Time
171 -- 184Zuling Chang, Pinhui Ke, Yongcheng Zhao. n-Periodic Sequences
185 -- 0Stefan Arnold. Identifying Generalized Reed-Muller Codewords by Quantum Queries

Volume 28, Issue 1

1 -- 18Guangkui Xu, Xiwang Cao, Shanding Xu. Several Classes of Quadratic Ternary Bent, Near-Bent and 2-Plateaued Functions
19 -- 28Rongjia Li, Chenhui Jin. Meet-in-the-Middle Attack on 11-Round 3D Block Cipher
29 -- 38Vecdi Aytaç, Zeynep Nihan Berberler. Binding Number and Wheel Related Graphs
39 -- 60Frank Gurski, Patrick Gwydion Poullie. Interval Routing Schemes for Circular-Arc Graphs
61 -- 76Dongfang Zhou, Jianxi Fan, Cheng-Kuan Lin, Jingya Zhou, Xi Wang. Cycles Embedding in Exchanged Crossed Cube
77 -- 0Samir Elouasbi, Andrzej Pelc. Deterministic Rendezvous with Detection Using Beeps